Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

SecurityTool Virus on Kids' Laptop


  • This topic is locked This topic is locked
51 replies to this topic

#1 fawnlebowitz

fawnlebowitz

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Central Virginia
  • Local time:10:08 AM

Posted 30 August 2010 - 06:55 PM

I have the SecurityTool Virus.

I can't access the internet even in SAFE Mode (using IE, Opera, or Chrome). I can however, move files over using an USB stick.

I can't open Task Manager.

This is a COMPAQ Laptop running Windows XP

I have tried running SuperAntispyware.exe in Not-SAFE mode and it says:

superantispyware.exe is infected with Virus.dos.zzz.1379. This workm is trying to send your credit card details uising Superantispyware.exe to connect to remote host.

I get a warning that says : SECURITY TOOL WARNING Your PC is still infected with dangerous viruses. Activate antivirus protection to prevent data loss and avoid the theft of your credit card details. Click here to activate protection.

When I try to open most any application i get a warning: Excel.exe is infected with Virus.DOS.TempVIR.466. This worm is trying to send your credit card details using Excel.exe to connect to remote host.

I have attached (1) attach.txt and (2) gmer.log

Here is my DDS Log:


DDS (Ver_10-03-17.01) - NTFSx86 MINIMAL
Run by Roesch at 19:06:46.73 on Sun 08/29/2010
Internet Explorer: 6.0.2900.5512

============== Running Processes ===============


============== Pseudo HJT Report ===============

uStart Page = hxxp://www.google.com/
uSearch Page = hxxp://www.google.com
uSearch Bar = hxxp://www.google.com/ie
uInternet Connection Wizard,ShellNext = iexplore
uInternet Settings,ProxyOverride = <local>
uInternet Settings,ProxyServer = http=127.0.0.1:6522
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
mSearchAssistant = hxxp://search.live.com/sphome.aspx
uURLSearchHooks: UrlSearchHook Class: {00000000-6e41-4fd3-8538-502f5495e5fc} -
uURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} -
uURLSearchHooks: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
uURLSearchHooks: H - No File
uURLSearchHooks: PageRage Toolbar: {9565115d-c7d6-46d3-bd63-b67b481a4368} - c:\program files\pagerage\tbPag1.dll
mURLSearchHooks: AIM Toolbar Search Class: {03402f96-3dc7-4285-bc50-9e81fefafe43} -
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - No File
BHO: AcroIEHlprObj Class: {06849e9f-c8d7-4d59-b87d-784b7d6be0b3} - c:\program files\adobe\acrobat 7.0\activex\AcroIEHelper.dll
BHO: AVG Safe Search: {3ca2f312-6f6e-4b53-a66e-4e65e497c8c0} - c:\program files\avg\avg9\avgssie.dll
BHO: {53707962-6f74-2d53-2644-206d7942484f} - Spybot-S&D IE Protection
BHO: Search Helper: {6ebf7485-159f-4bff-a14f-b9e3aac4465b} - c:\program files\microsoft\search enhancement pack\search helper\SEPsearchhelperie.dll
BHO: SSVHelper Class: {761497bb-d6f0-462c-b6eb-d4daf1d92d43} - c:\program files\java\jre6\bin\ssv.dll
BHO: Windows Live ID Sign-in Helper: {9030d464-4c02-4abf-8ecc-5164760863c6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: PageRage Toolbar: {9565115d-c7d6-46d3-bd63-b67b481a4368} - c:\program files\pagerage\tbPag1.dll
BHO: AVG Security Toolbar BHO: {a3bc75a2-1f87-4686-aa43-5347d756017c} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
BHO: Google Toolbar Helper: {aa58ed58-01dd-4d91-8333-cf10577473f7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: Google Toolbar Notifier BHO: {af69de43-7d58-4638-b6fa-ce66b5ad205d} - c:\program files\google\googletoolbarnotifier\5.5.5126.1836\swg.dll
BHO: AIM Toolbar Loader: {b0cda128-b425-4eef-a174-61a11ac5dbf8} - AIM Toolbar Loader
BHO: Bing Bar BHO: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn toolbar\platform\5.0.1423.0\npwinext.dll
BHO: Ask Toolbar BHO: {d4027c7f-154a-4066-a1ad-4243d8127440} - FrostWire Toolbar
BHO: Java™ Plug-In 2 SSV Helper: {dbc80044-a445-435b-bc74-9c25c1c588a9} - c:\program files\java\jre6\bin\jp2ssv.dll
BHO: JQSIEStartDetectorImpl Class: {e7e6f031-17ce-4c07-bc86-eabfe594f69c} - c:\program files\java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
BHO: Yontoo Layers: {fd72061e-9fde-484d-a58a-0bab4151cad8} - c:\program files\yontoo layers client\YontooIEClient.dll
TB: AVG Security Toolbar: {ccc7a320-b3ca-4199-b1a6-9f516dd69829} - c:\program files\avg\avg9\toolbar\IEToolbar.dll
TB: AIM Toolbar: {61539ecd-cc67-4437-a03c-9aaccbd14326} -
TB: PageRage Toolbar: {9565115d-c7d6-46d3-bd63-b67b481a4368} - c:\program files\pagerage\tbPag1.dll
TB: @c:\program files\msn toolbar\platform\5.0.1423.0\npwinext.dll,-100: {8dcb7100-df86-4384-8842-8fa844297b3f} - c:\program files\msn toolbar\platform\5.0.1423.0\npwinext.dll
TB: Google Toolbar: {2318c2b1-4965-11d4-9b18-009027a5cd4f} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: FrostWire Toolbar: {d4027c7f-154a-4066-a1ad-4243d8127440} -
TB: {C4069E3A-68F1-403E-B40E-20066696354B} - No File
TB: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - No File
uRun: [swg] "c:\program files\google\googletoolbarnotifier\GoogleToolbarNotifier.exe"
uRunOnce: [82893887] "c:\docume~1\roesch~1.kid\locals~1\applic~1\82893887.exe" 0 46
mRun: [Symantec PIF AlertEng] "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\pifsvc.exe" /a /m "c:\program files\common files\symantec shared\pif\{b8e1dd85-8582-4c61-b58f-2f227fca9a08}\AlertEng.dll"
IE: &Search
IE: E&xport to Microsoft Excel - c:\progra~1\micros~4\office11\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBC} - c:\program files\java\jre6\bin\jp2iexp.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\progra~1\micros~4\office11\REFIEBAR.DLL
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F}
DPF: {6F15128C-E66A-490C-B848-5000B5ABEEAC} - hxxps://h20436.www2.hp.com/ediags/dex/secure/HPDEXAXO.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {A90A5822-F108-45AD-8482-9BC8B12DD539} - hxxp://www.crucial.com/controls/cpcScanner.cab
DPF: {CAFEEFAC-0015-0000-0006-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_06-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_13-windows-i586.cab
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
Handler: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - c:\program files\avg\avg9\avgpp.dll
Notify: !SASWinLogon - c:\program files\superantispyware\SASWINLO.DLL
Notify: avgrsstarter - avgrsstx.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
Hosts: 127.0.0.1 www.spywareinfo.com

============= SERVICES / DRIVERS ===============


=============== Created Last 30 ================

2010-08-29 23:06:03 525824 ----a-w- C:\dds.scr
2010-08-29 23:06:03 263168 ----a-w- C:\rkill.scr
2010-08-29 20:11:17 0 d-----w- c:\documents and settings\roesch.kids_computer\DoctorWeb
2010-08-29 15:09:41 316 ----a-w- c:\windows\lsrslt.ini
2010-08-29 03:42:16 0 d-----w- c:\docume~1\alluse~1\applic~1\Update
2010-08-29 03:23:39 0 d-----w- c:\docume~1\roesch~1.kid\applic~1\uTorrent
2010-08-13 01:46:39 0 d-----w- c:\program files\Convert AVI to MP4

==================== Find3M ====================

2010-07-27 06:30:35 8462336 ------w- c:\windows\system32\dllcache\shell32.dll
2010-07-16 12:31:48 243024 ----a-w- c:\windows\system32\drivers\avgtdix.sys
2010-07-16 12:31:46 12536 ----a-w- c:\windows\system32\avgrsstx.dll
2010-07-16 12:30:59 216400 ----a-w- c:\windows\system32\drivers\avgldx86.sys
2010-06-30 12:31:35 149504 ----a-w- c:\windows\system32\schannel.dll
2010-06-30 12:31:35 149504 ------w- c:\windows\system32\dllcache\schannel.dll
2010-06-24 12:10:44 81920 ----a-w- c:\windows\system32\ieencode.dll
2010-06-24 12:10:44 81920 ------w- c:\windows\system32\dllcache\ieencode.dll
2010-06-24 12:10:44 667136 ----a-w- c:\windows\system32\wininet.dll
2010-06-24 12:10:44 667136 ------w- c:\windows\system32\dllcache\wininet.dll
2010-06-24 12:10:44 627712 ------w- c:\windows\system32\dllcache\urlmon.dll
2010-06-24 12:10:44 3073024 ------w- c:\windows\system32\dllcache\mshtml.dll
2010-06-24 12:10:44 251904 ------w- c:\windows\system32\dllcache\iepeers.dll
2010-06-24 12:10:44 1509888 ------w- c:\windows\system32\dllcache\shdocvw.dll
2010-06-24 12:10:44 1025024 ------w- c:\windows\system32\dllcache\browseui.dll
2010-06-23 13:44:04 1851904 ----a-w- c:\windows\system32\win32k.sys
2010-06-23 13:44:04 1851904 ------w- c:\windows\system32\dllcache\win32k.sys
2010-06-21 15:27:11 354304 ------w- c:\windows\system32\dllcache\srv.sys
2010-06-18 13:36:12 3558912 ------w- c:\windows\system32\dllcache\moviemk.exe
2010-06-17 14:03:00 80384 ----a-w- c:\windows\system32\iccvid.dll
2010-06-14 14:31:20 744448 ------w- c:\windows\system32\dllcache\helpsvc.exe
2010-06-14 07:41:45 1172480 ----a-w- c:\windows\system32\msxml3.dll
2010-06-14 07:41:45 1172480 ------w- c:\windows\system32\dllcache\msxml3.dll
2009-01-14 12:28:43 3754890 ----a-w- c:\program files\01 Sandstorm.m4p

============= FINISH: 19:07:23.21 ===============

I have found the following guide for removing SecurityTool:

http://www.bleepingcomputer.com/virus-remo...e-security-tool

unfortunately, I have tried running rkill.exe, rkill.com, rkill.pif, rkill.bat, rkill.scr and SecurityTool keeps preventing it from running. I have even tried to rename it to something like EXPLORER.EXE I get a warning where it says rkill.exe is infected with Virus.dos.lenin.943. This worm is trying to send your credit card details using rkill.com to connect to remote host.

I am trying to run rkill in NON-SAFE mode. I am able to see the desktop in Non-Safe mode, but rkill doesn't run. i see the 'black' square for an instant, but rkill seems to get stopped. I have tried running RKILL a second time while the warning is up, but it seems to get killed itself instantly.

Also, occaisionally, it looks like i get the Blue-screen-of-death, but i get the impression that it is part of the SecurityTool virus because i can hit the power button and it will disapear and go back to the desktop.

i can update Malwarebytes manually and run that in FullScan, but because i can't get Rkill to work, SecurityTool comes back when Malwarebytes re-starts the computer.

Also, all my previous restore points are gone.

I have not tried to make any changes to the HOSTS files because I can't get RKILL to work.

Does anyone have any thoughts?

Thank you!

EDIT: Posts merged ~BP

Attached Files


Edited by Budapest, 01 September 2010 - 04:57 PM.


BC AdBot (Login to Remove)

 


#2 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:08 PM

Posted 08 September 2010 - 05:57 PM

Hi,

Welcome to Bleeping Computer. My name is m0le and I will be helping you with your log.
  • Please subscribe to this topic, if you haven't already. You can subscribe by clicking the Options box to the right of your topic title and selecting Track This Topic.

  • Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible.

  • Please reply to this post so I know you are there.
The forum is busy and we need to have replies as soon as possible. If I haven't had a reply after 3 days I will bump the topic and if you do not reply by the following day after that then I will close the topic.

Once I receive a reply then I will return with your first instructions.

Thanks thumbup2.gif
Posted Image
m0le is a proud member of UNITE

#3 fawnlebowitz

fawnlebowitz
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Central Virginia
  • Local time:10:08 AM

Posted 10 September 2010 - 06:02 AM

Dear Mole:

While i was waiting for a reply, i found the below link on BleepingComputer:

http://www.bleepingcomputer.com/virus-remo...e-security-tool

I started doing the instructions in that, now my computer is locked up!

As the final step, I ran MalwareBytes and it asked me to re-start.

When I tried to restart, the computer started cycling through the Compaq Flash Screen ==> Select_OS_Options ==> Windows Flash Screen, then it would go back to the Compaq Flash screen and it cycles through those endlessly.

If I hit f10 on the Compaq Screen. I can get to the PhoenixBIOS setup Utility. About the only thing i can do in there is run the Hard Drive Self Test under Diagnostics, but it doesn't find anything wrong using both the Quick and Comprehensive Tests.

If i hit the Recovery Console option on the Select OS Options, I get the Blue Screen of Death (BSOD) with the following error:

STOP 0X0000007B (0XF7A57524, 0XC0000034, 0X00000000, 0X00000000)

Can this be fixed?

Let me know if you need more information!

#4 m0le

m0le

    Can U Dig It?


  • Malware Response Team
  • 34,527 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:London, UK
  • Local time:03:08 PM

Posted 10 September 2010 - 04:41 PM

We have to try and boot the PC using a repair disk

Let's try to boot your computer using the Ultimate Boot CD for Windows (UBCD4win).

Please print this guide for future reference!

You will need a blank CD, a clean computer and a flash drive.

Please follow the steps below and let me know if you were successful. If you were unable to create the UBCD4win, please tell me what error messages you got and/or what steps you got hung up on.

1. Download and Run Ultimate Boot CD for Windows
  • Save it to your Desktop.
  • Double-Click on the UBCD4Win.EXE that you just downloaded to your desktop.
  • Follow all of the instructions/prompts that come up.
    NOTES:
    • Do not install to a folder with spaces in it's name.
    • Your Anti-Virus may report viruses or trojans when you extract UBCD4Win, these are "False-Positives." Read HERE for information regarding the files that normally trigger AV software.
2. Insert your XP CD with SP1/SP2/SP3 into a CD Rom drive
  • Double-Click on UBCD4WinBuilder.exe located in your C:\ubcd4win folder.
  • Click "I agree" to the Builders License.
  • Click NO to Search for Windows Installation Files
  • Make the following selections from the Main Screen that pops up:
    • Builder
      • Source:(path to Windows installation files)
        • Enter the path to the drive where your XP CD is located.
        • You can click on the "..." button on the right to navigate to the path as well.
      • Custom: (include files and folders from this directory)
        • No information is necessary, leave blank.
      • Output: (C:\ubcd4win\BartPE)
        • Keep the default BartPE
    • Media output
      • Choose Create ISO image
      • Do not choose Burn to CD/DVD


        Please note: If your XP install disc is SP1 then please .....
        1. Disable- DComLaunch Service
        2. Enable- LargeIDE Fix

          This can be done by pressing the "Plugin" button and checking or unchecking the appropriate selections

      Also note: If you have a Dell XP install disc you will need to follow the instructions here
      http://www.ubcd4win.com/faq.htm#dell

    3. Click on the "Build" button
    • You will see the Windows EULA message. Click on I Agree
    • You will now see the Build Screen. Let it run it's course
    • When the Build is finished you can click close, then exit


    4. Burn your ISO file to CD
    • Please see HERE on how to burn an ISO to CD.

    ==========

    Next........

    From your clean computer..

    Please download OTLPE.zip and save it to a flash drive.
    http://oldtimer.geekstogo.com/OTLPE.zip
    http://www.itxassociates.com/OT-Tools/OTLPE.zip

    Double click and unzip OTLPE.zip to its own folder on your flash drive. Name it OTLPE <-- Important!!

    ==========

    Plug your flash drive into your sick computer now and do as instructed below..

    ==========

    1. Restart Your sick Computer Using the UBCD4Win Disc That You Have Created
    • Insert the UBCD4Win disc in to one of your CD/DVD drives.
    • Restart your computer.
      • The computer should choose to boot from the UBCD4Win CD automatically. If it doesn't and you are asked if you want to boot from CD, then choose that option.
    • In the window that pops up select Launch The Ultimate Boot CD For Windows and press Enter.
      • It may take a little longer for the Desktop to appear than it does when you start your computer normally. Just let the process run itself until the desktop appears.
    • Once the desktop appears, you will receive a message asking: Do you want to start Network support?
      • Click on Yes if you want to use the PE environment to get online post your log and reply by way of an Ethernet connection.
    • You should now have a desktop that looks like this:

    ==========

    Single click My computer from your UBCD4W desktop to navigate to the OTLPE folder that you saved to your flash drive.

    Open the OTLPE folder and double click Start.bat.
    • When asked "Do you wish to load remote user profile(s) for scanning", select Yes
    • Ensure the box "Automatically Load All Remaining Users" is checked and press OK
    • OTLPE should now start

      Change the following settings
      • Change Services, Drivers, Standard and Extra Registry to All

    • Copy and Paste the following code into the textbox. Do not include the word "Code"

      CODE
      netsvcs
      msconfig
      safebootminimal
      safebootnetwork
      activex
      drivers32
      %ALLUSERSPROFILE%\Application Data\*.
      %ALLUSERSPROFILE%\Application Data\*.exe /s
      %APPDATA%\*.
      %APPDATA%\*.exe /s
      %SYSTEMDRIVE%\*.exe
      /md5start
      userinit.exe
      eventlog.dll
      scecli.dll
      netlogon.dll
      cngaudit.dll
      sceclt.dll
      ntelogon.dll
      logevent.dll
      iaStor.sys
      nvstor.sys
      atapi.sys
      IdeChnDr.sys
      viasraid.sys
      AGP440.sys
      vaxscsi.sys
      nvatabus.sys
      viamraid.sys
      nvata.sys
      nvgts.sys
      iastorv.sys
      ViPrt.sys
      eNetHook.dll
      ahcix86.sys
      KR10N.sys
      nvstor32.sys
      ahcix86s.sys
      /md5stop
      %systemroot%\system32\drivers\*.sys /lockedfiles
      %systemroot%\System32\config\*.sav
      %systemroot%\*. /mp /s
      %systemroot%\system32\*.dll /lockedfiles
      %systemroot%\system32\drivers\*.sys /90
      CREATERESTOREPOINT

    • Push
    • A report will open. Save that log to your flash drive. Copy and Paste that report in your next reply.

    =========

    With your next post please provide:

    * OTLPE.txt
    Posted Image
    m0le is a proud member of UNITE

    #5 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 07:28 AM

    Dear Mole:

    you second step is:

    2. Insert your XP CD with SP1/SP2/SP3 into a CD Rom drive

    I don't have an XP CD. My computer came with XP already loaded.

    Where do I get an XP CD from?

    ThankS

    #6 m0le

    m0le

      Can U Dig It?


    • Malware Response Team
    • 34,527 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:London, UK
    • Local time:03:08 PM

    Posted 11 September 2010 - 08:13 AM

    Please download the Recovery Console Bootable CD iso
    Unzip the file and user your favourite burning application to burn the iso to a CD. Note, this is not the same as just burning the iso file on a CD.

    Edited by m0le, 11 September 2010 - 10:04 AM.

    Posted Image
    m0le is a proud member of UNITE

    #7 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 10:02 AM

    Okay, I burned the iso/image to CD, but when I run the UBCD4IN PE Builder, it gives the the following error message:

    INVALID SOURCE PATH

    (Cannot find file: E\i386\layout.inf)


    #8 m0le

    m0le

      Can U Dig It?


    • Malware Response Team
    • 34,527 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:London, UK
    • Local time:03:08 PM

    Posted 11 September 2010 - 10:59 AM

    The recovery disk is missing a file which your original system had installed so it can't be used. sad.gif

    Let's see if there is an available registry backup we can use to help get your computer booting properly

    You will need a USB drive for this step.
    • Download http://unetbootin.sourceforge.net/unetboot...dows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer
    • Insert your USB drive
    • Press Start > My Computer > right click your USB drive > choose Format > Quick format
    • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
    • Press Run then OK
    • It will install a little bootable OS on your USB
    • After it has completed do not choose to reboot the clean computer simply close the installer
    • Next download http://noahdfear.net/downloads/driver.sh to your USB
    • Remove the USB and insert it in the sick computer
    • Boot the Sick computer
    • Press F12 and choose to boot from the USB
    • Follow the prompts
    • A Welcome to xPUD screen will appear
    • Press File
    • Expand mnt
    • Expand your USB (sdb1)
    • Press Tool at the top
    • Choose Open Terminal
    • Type bash rst.sh -r
    • Type REMOVED INFORMATION>>>
    • Press Enter
    • After it has finished a report will be located at sdb1 named restore.log
    • Please try to boot into normal Windows now and indicate if you were successful
    Please note - all text entries are case sensitive

    Copy and paste the restore.log from your USB drive for my review

    Edited by m0le, 11 September 2010 - 08:49 PM.

    Posted Image
    m0le is a proud member of UNITE

    #9 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 01:23 PM

    there was not a restore.log file but a report.txt file.

    I have uploaded the report.txt file let me know if that is the correct one.

    Also, i tried re-booting the sick machine...it still recycles between the compaq flash screen and the WindowsXP flash screen.

    Thanks!

    Attached Files



    #10 m0le

    m0le

      Can U Dig It?


    • Malware Response Team
    • 34,527 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:London, UK
    • Local time:03:08 PM

    Posted 11 September 2010 - 01:59 PM

    Let's look for some bad drivers next.
    • Boot the Sick computer
    • Press F12 and choose to boot from the USB
    • Follow the prompts
    • A Welcome to xPUD screen will appear
    • Press File
    • Expand mnt
    • sda1,2...usually corresponds to your HDD
    • sdb1 is likely your USB
    • Click on the folder that represents your USB drive (sdb1 ?)
    • Confirm that you see driver.sh that you downloaded there
    • Press Tool at the top
    • Choose Open Terminal
    • Type bash driver.sh
    • Press Enter
    • After it has finished a report will be located on your USB drive named report.txt
    • Remove the USB drive and insert back in your working computer and navigate to report.txt

      Please note - all text entries are case sensitive
    Copy and paste the report.txt for my review
    Posted Image
    m0le is a proud member of UNITE

    #11 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 03:36 PM

    here is the report.txt


    Driver report for /mnt/sda2/MiniNT/system32/drivers
    /mnt/sda1/SWSetup/InetSec06/US/Support/SymNet/SymNet/System32/Drivers
    /mnt/sda1/WINDOWS/system32/drivers

    6e1ec659e9ca82dd7d4afd982d11a731 wmiacpi.sys has NO Company Name!



    c1536905ad2067812a238bce998f4bff 1394bus.sys
    Microsoft Corporation

    9859c0f6936e723e4892d7141b1327d5 acpiec.sys
    Microsoft Corporation

    8fd99680a539792a30e97944fdaecf17 acpi.sys
    Microsoft Corporation

    9a11864873da202c996558b2106b0bbc adpu160m.sys
    Microsoft Corporation

    8bed39e3c35d6a489438b8141717a557 aec.sys
    Microsoft Corporation

    7e775010ef291da96ad17ca4b17137d7 afd.sys
    Microsoft Corporation

    08fd04aa961bdc77fb983f328334e3d7 agp440.sys
    Microsoft Corporation

    03a7e0922acfe1b07d5db2eeb0773063 agpcpq.sys
    Microsoft Corporation

    c23ea9b5f46c7f7910db3eab648ff013 aha154x.sys
    Microsoft Corporation

    19dd0fb48b0c18892f70e2e7d61a1529 aic78u2.sys
    Microsoft Corporation

    b7fe594a7468aa0132deb03fb8e34326 aic78xx.sys
    Microsoft Corporation

    1140ab9938809700b46bb88e46d72a96 aliide.sys
    Acer Laboratories

    cb08aed0de2dd889a8a820cd8082d83c alim1541.sys
    Microsoft Corporation

    95b4fb835e28aa1336ceeb07fd5b9398 amdagp.sys
    Advanced Micro Devices

    d7701d7e72243286cc88c9973d891057 amdk6.sys
    Microsoft Corporation

    8fce268cdbdd83b23419d1f35f42c7b1 amdk7.sys
    Microsoft Corporation

    79f5add8d24bd6893f2903a3e2f3fad6 amsint.sys
    Microsoft Corporation

    b5b8a80875c1dededa8b02765642c32f arp1394.sys
    Microsoft Corporation

    69eb0cc7714b32896ccbfd5edcbea447 asc3350p.sys
    Microsoft Corporation

    5d8de112aa0254b907861e9e9c31d597 asc3550.sys
    Advanced System Products

    62d318e9a0c8fc9b780008e724283707 asc.sys
    Advanced System Products

    b153affac761e7f5fcfa822b9c4e97bc asyncmac.sys
    Microsoft Corporation

    9f3a2f5aa6875c72bf062c712cfa2674 atapi.sys
    Microsoft Corporation

    d649c57da6fa762c64013747e5d7d2d6 ati1btxx.sys
    ATI Technologies

    60b6aa2dc1521da343f781b70eb7895a ati1mdxx.sys
    ATI Technologies

    6fdc61e8e8e17f6ecc2d9a10fa8df347 ati1pdxx.sys
    ATI Technologies

    9d318099bf3876a4af4bc75966d27603 ati1raxx.sys
    ATI Technologies

    bcaf267b10620f8c93f6e87ab726e145 ati1rvxx.sys
    ATI Technologies

    dac7d785cf62f5bd41441e9d6f5a6efe ati1snxx.sys
    ATI Technologies

    f7706dae7d101f1b19ce552d772ebfce ati1ttxx.sys
    ATI Technologies

    6f714b4720dd80ffa9f8d2731594ea4c ati1tuxx.sys
    ATI Technologies

    67ffbc158dd4d27ba3fc92c6acd87f73 ati1xbxx.sys
    ATI Technologies

    0d8cab1f08f7d3c4de228b49e12e596a ati1xsxx.sys
    ATI Technologies

    2d030c2f6b036ca0bc243e1b16d924d1 ati2mtaa.sys
    ATI Technologies

    8759322ffc1a50569c1e5528ee8026b7 ati2mtag.sys
    ATI Technologies

    993e7bd6438fe989e328c6b4bca246a9 atinbtxx.sys
    ATI Technologies

    ed4c2bf8403f4437987c0ba09cf48716 atinmdxx.sys
    ATI Technologies

    e90ac2b14e98f1a4372e5891b4278784 atinpdxx.sys
    ATI Technologies

    da36687d701c833430605a298731410b atinraxx.sys
    ATI Technologies

    a7a01b907db63898d40b0a14248ff9a2 atinrvxx.sys
    ATI Technologies

    ceddee2e0591894d19654d458fd3b9be atinsnxx.sys
    ATI Technologies

    d80a8f6c0a717446496c3a06d33b0d9c atinttxx.sys
    ATI Technologies

    edd66332608d27f4fd5069bcd0bc5164 atintuxx.sys
    ATI Technologies

    3e7d485cbd0b0d9f6ea2ad9442411831 atinxbxx.sys
    ATI Technologies

    77b575d7aab35d5908ae6ce681608d62 atinxsxx.sys
    ATI Technologies

    9916c1225104ba14794209cfa8012159 atmarpc.sys
    Microsoft Corporation

    39a0a59180f19946374275745b21aeba atmepvc.sys
    Microsoft Corporation

    ae76348a2605fb197fa8ff1d6f547836 atmlane.sys
    Microsoft Corporation

    e7ef69b38d17ba01f914ae8f66216a38 atmuni.sys
    Microsoft Corporation

    d9f724aa26c010a217c97606b160ed68 audstub.sys
    Microsoft Corporation

    91c8887520ee93b2fc7387687fd182cb avgntflt.sys
    Avira Gmb

    0d93976f7801b7fcd8135cc77257bbd0 battc.sys
    Microsoft Corporation

    da1f27d85e0d1525f6621372e7b685e9 beep.sys
    Microsoft Corporation

    f934d1b230f84e1d19dd00ac5a7a83ed bridge.sys
    Microsoft Corporation

    b279426e3c0c344893ed78a613a73bde bthenum.sys
    Microsoft Corporation

    fca6f069597b62d42495191ace3fc6c1 bthmodem.sys
    Microsoft Corporation

    80602b8746d3738f5886ce3d67ef06b6 bthpan.sys
    Microsoft Corporation

    662bfd909447dd9cc15b1a1c366583b4 bthport.sys
    Microsoft Corporation

    bb68cebffd181e18a26112d1b9f90f3d bthprint.sys
    Microsoft Corporation

    61364cd71ef63b0f038b7e9df00f1efa bthusb.sys
    Microsoft Corporation

    90a673fc8e12a79afbed2576f6a7aaf9 cbidf2k.sys
    Microsoft Corporation

    f3ec03299634490e97bbce94cd2954c7 cd20xrnt.sys
    Microsoft Corporation

    c1b486a7658353d33a10cc15211a873b cdaudio.sys
    Microsoft Corporation

    c885b02847f5d2fd45a24e219ed93b32 cdfs.sys
    Microsoft Corporation

    1f4260cc5b42272d71f79e570a27a4fe cdrom.sys
    Microsoft Corporation

    88e368ddc0b2200200d6810f63aab97f CHDAud.sys
    Conexant

    b562592b7f5759c99e179ca467ecfb4c cinemst2.sys
    Ravisent Technologies

    fe47dd8fe6d7768ff94ebec6c74b2719 classpnp.sys
    Microsoft Corporation

    0f6c187d38d98f8df904589a5f94d411 cmbatt.sys
    Microsoft Corporation

    e5dcb56c533014ecbc556a8357c929d5 cmdide.sys
    CMD Technology

    6e4c9f21f0fae8940661144f41b13203 compbatt.sys
    Microsoft Corporation

    3ee529119eed34cd212a215e8c40d4b6 cpqarray.sys
    Microsoft Corporation

    4d4d97671c63c3af869b3518e6054204 CPQBttn.sys
    Hewlett-Packard

    9624293e55ad405415862b504ca95b73 cpqdap01.sys
    Compaq Computer Corp

    f50d9bdbb25cce075e514dc07472a22f crusoe.sys
    Microsoft Corporation

    e550e7418984b65a78299d248f0a7f36 dac2w2k.sys
    Mylex Corporation

    683789caa3864eb46125ae86ff677d34 dac960nt.sys
    Microsoft Corporation

    744f4990513c2a8f3da6fce0abecbe11 dfg.sys
    tH`VS_VERSION_INFO?StringFileInfobPCompanyNamedefragDevelopmentTeamDFileDescriptiondefragDrivervFileVersion,,,(InternalNamedfgFLegalCopyrightCopyrightbOriginalFilenamedfg.sys.aProductNamedefrag:vProductVersion,,,DVarFileInfo$Translationt*

    e65e2353a5d74ea89971cb918eeeb2f6 diskdump.sys
    Microsoft Corporation

    044452051f3e02e7963599fc8f4f3e25 disk.sys
    Microsoft Corporation

    d992fe1274bde0f84ad826acae022a41 dmboot.sys
    Microsoft Corp

    7c824cf7bbde77d95c08005717a95f6f dmio.sys
    Microsoft Corp

    e9317282a63ca4d188c0df5e09c6ac5f dmload.sys
    Microsoft Corp

    8a208dfcf89792a484e76c40e5f50b45 dmusic.sys
    Microsoft Corporation

    40f3b93b4e5b0126f2f5c0a7a5e22660 dpti2o.sys
    Microsoft Corporation

    8f5fcff8e8848afac920905fbd9d33c8 drmkaud.sys
    Microsoft Corporation

    6cb08593487f5701d2d2254e693eafce drmk.sys
    Microsoft Corporation

    fe97d0343acfdebdd578fc67cc91fa87 dxapi.sys
    Microsoft Corporation

    ac7280566a7bb85cb3291f04ddc1198e dxg.sys
    Microsoft Corporation

    a73f5d6705b1d820c19b18782e176efd dxgthk.sys
    Microsoft Corporation

    6ca101f9aa3d845ba31f6e13c01301a8 e100b325.sys
    Intel Corporation

    b5cb3084046146fd2587d8c9b219feb4 eabfiltr.sys
    Hewlett-Packard

    231f4547ae1e4b3e60eca66c3a96d218 EabUsb.sys
    Hewlett-Packard

    80d1b490b60e74e002dc116ec5d41748 enum1394.sys
    Microsoft Corporation

    38d332a6d56af32635675f132548343e fastfat.sys
    Microsoft Corporation

    92cdd60b6730b9f50f6a1a0c1f8cdc81 fdc.sys
    Microsoft Corporation

    d45926117eb9fa946a6af572fbe1caa3 fips.sys
    Microsoft Corporation

    9d27e7b80bfcdf1cdd9b555862d5e7f0 flpydisk.sys
    Microsoft Corporation

    b2cf4b0786f8212cb92ed2b50c6db6b0 fltmgr.sys
    Microsoft Corporation

    3e1e2bd4f39b0e2b7dc4f4d2bcc2779a fs_rec.sys
    Microsoft Corporation

    455f778ee14368468560bd7cb8c854d0 fsvga.sys
    Microsoft Corporation

    6ac26732762483366c3969c9e4d2259d ftdisk.sys
    Microsoft Corporation

    3a74c423cf6bcca6982715878f450a3b gagp30kx.sys
    Microsoft Corporation

    8182ff89c65e4d38b2de4bb0fb18564e GEARAspiWDM.sys
    GEAR Software

    573c7d0a32852b48f3058cfd8026f511 hdaudbus.sys
    Windows Server DDK provider

    2a013e7530beab6e569faa83f517e836 Hdaudio.sys
    Windows Server DDK provider

    7bd2de4c85eb4241eed57672b16a7d8d hidbth.sys
    Microsoft Corporation

    1af592532532a402ed7c060f6954004f hidclass.sys
    Microsoft Corporation

    bb1a6fb7d35a91e599973fa74a619056 hidir.sys
    Microsoft Corporation

    96eccf28fdbf1b2cc12725818a63628d hidparse.sys
    Microsoft Corporation

    ccf82c5ec8a7326c3066de870c06daf1 hidusb.sys
    Microsoft Corporation

    b028377dea0546a5fcfba928a8aefae0 hpn.sys
    Microsoft Corporation

    9f1d80908658eb7f1bf70809e0b51470 HPZid412.sys
    HP

    f7e3e9d50f9cd3de28085a8fdaa0a1c3 HPZipr12.sys
    HP

    cf1b7951b4ec8d13f3c93b74bb2b461b HPZius12.sys
    HP

    970178e8e003eb1481293830069624b9 hsfbs2s2.sys
    Conexant

    214bc3ad84907ad6ad655ac5465f449a HSF_CNXT.sys
    Conexant

    1225ebea76aac3c84df6c54fe5e5d8be hsfcxts2.sys
    Conexant

    ebb354438a4c5a3327fb97306260714a hsfdpsp2.sys
    Conexant

    0e44af3828111d4c3e73c33ac95226d8 HSF_DPV.sys
    Conexant

    89e256c5f5346be265d9f86ac8625d4f HSFHWAZL.sys
    Conexant

    f80a415ef82cd06ffaf0d971528ead38 http.sys
    Microsoft Corporation

    9368670bd426ebea5e8b18a62416ec28 i2omgmt.sys
    Microsoft Corporation

    f10863bf1ccc290babd1a09188ae49e0 i2omp.sys
    Microsoft Corporation

    4a0b06aa8943c1e332520f7440c0aa30 i8042prt.sys
    Microsoft Corporation

    0f0194c4b635c10c3f785e4fee52d641 ialmnt5.sys
    Intel Corporation

    309c4d86d989fb1fcf64bd30dc81c51b iaStor.sys
    Intel Corporation

    083a052659f5310dd8b6a6cb05edcf8e imapi.sys
    Microsoft Corporation

    4a40e045faee58631fd8d91afc620719 ini910u.sys
    Microsoft Corporation

    b5466a9250342a7aa0cd1fba13420678 intelide.sys
    Microsoft Corporation

    8c953733d8f36eb2133f5bb58808b66b intelppm.sys
    Microsoft Corporation

    3bb22519a194418d5fec05d800a19ad0 ip6fw.sys
    Microsoft Corporation

    731f22ba402ee4b62748adaf6363c182 ipfltdrv.sys
    Microsoft Corporation

    b87ab476dcf76e72010632b5550955f5 ipinip.sys
    Microsoft Corporation

    cc748ea12c6effde940ee98098bf96bb ipnat.sys
    Microsoft Corporation

    23c74d75e36e7158768dd63d92789a91 ipsec.sys
    Microsoft Corporation

    c93c9ff7b04d772627a3646d89f7bf89 irenum.sys
    Microsoft Corporation

    05a299ec56e52649b1cf2fc52d20f2d7 isapnp.sys
    Microsoft Corporation

    463c1ec80cd17420a542b7f36a36f128 kbdclass.sys
    Microsoft Corporation

    9ef487a186dea361aa06913a75b3fa99 kbdhid.sys
    Microsoft Corporation

    692bcf44383d056aed41b045a323d378 kmixer.sys
    Microsoft Corporation

    b467646c54cc746128904e1654c750c1 ksecdd.sys
    Microsoft Corporation

    0753515f78df7f271a5e61c20bcd36a1 ks.sys
    Microsoft Corporation

    b7c19ec8b0dd7efa58ad41ffeb8b8cda Lbd.sys
    Lavasoft

    c7dd7d9739785bd3a6b8499eec1dee7e mbamswissarmy.sys
    Malwarebytes Corporation

    67b48a903430c6d4fb58cbaca1866601 mbam.sys
    Malwarebytes Corporation

    d1f8be91ed4ddb671d42e473e3fe71ab mcd.sys
    Microsoft Corporation

    74f4372af97a587ecec527ec34955712 mdmxsdk.sys
    Conexant

    a7da20ab18a1bdae28b0f349e57da0d1 mf.sys
    Microsoft Corporation

    4ae068242760a1fb6e1a44bf4e16afa6 mnmdd.sys
    Microsoft Corporation

    dfcbad3cec1c5f964962ae10e0bcc8e1 modem.sys
    Microsoft Corporation

    35c9e97194c8cfb8430125f8dbc34d04 mouclass.sys
    Microsoft Corporation

    b1c303e17fb9d46e87a98e4ba6769685 mouhid.sys
    Microsoft Corporation

    a80b9a0bad1b73637dbcbba7df72d3fd mountmgr.sys
    Microsoft Corporation

    3f4bb95e5a44f3be34824e8e7caf0737 mraid35x.sys
    American Megatrends

    11d42bb6206f33fbb3ba0288d3ef81bd mrxdav.sys
    Microsoft Corporation

    f3aefb11abc521122b67095044169e98 mrxsmb.sys
    Microsoft Corporation

    c941ea2454ba8350021d774daf0f1027 msfs.sys
    Microsoft Corporation

    0a02c63c8b144bd8c86b103dee7c86a2 msgpc.sys
    Microsoft Corporation

    d1575e71568f4d9e14ca56b7b0453bf1 mskssrv.sys
    Microsoft Corporation

    325bb26842fc7ccc1fcce2c457317f3e mspclock.sys
    Microsoft Corporation

    bad59648ba099da4a17680b39730cb3d mspqm.sys
    Microsoft Corporation

    af5f4f3f14a8ea2c26de30f7a1e17136 mssmbios.sys
    Microsoft Corporation

    c53775780148884ac87c455489a0c070 mtlmnt5.sys
    Smart Link

    54886a652bf5685192141df304e923fd mtlstrm.sys
    Smart Link

    6dda78a0be692b61b668fab860f276cf mtxparhm.sys
    Matrox Graphics

    2f625d11385b1a94360bfc70aaefdee1 mup.sys
    Microsoft Corporation

    b538dcd9816ea35fa4f637cfc261aaa8 mutohpen.sys
    Microsoft Corporation

    1df7f42665c94b825322fae71721130d ndis.sys
    Microsoft Corporation

    1ab3d00c991ab086e69db84b6c0ed78f ndistapi.sys
    Microsoft Corporation

    f927a4434c5028758a842943ef1a3849 ndisuio.sys
    Microsoft Corporation

    edc1531a49c80614b2cfda43ca8659ab ndiswan.sys
    Microsoft Corporation

    6215023940cfd3702b46abc304e1d45a ndproxy.sys
    Microsoft Corporation

    5d81cf9a2f1a3a756b66cf684911cdf0 netbios.sys
    Microsoft Corporation

    74b2b2f5bea5e9a3dc021d685551bd3d netbt.sys
    Microsoft Corporation

    e9e47cfb2d461fa0fc75b7a74c6383ea nic1394.sys
    Microsoft Corporation

    be984d604d91c217355cdd3737aad25d nikedrv.sys
    Diamond Multimedia Systems

    1e421a6bcf2203cc61b821ada9de878b nmnt.sys
    Microsoft Corporation

    3182d64ae053d6fb034f44b6def8034a npfs.sys
    Microsoft Corporation

    78a08dd6a8d65e697c18e1db01c5cdca ntfs.sys
    Microsoft Corporation

    576b34ceae5b7e5d9fd2775e93b3db53 ntmtlfax.sys
    Smart Link

    73c1e1f395918bc2c6dd67af7591a3ad null.sys
    Microsoft Corporation

    2b298519edbfcf451d43e0f1e8f1006d nv4_mini.sys
    NVIDIA Corporation

    b305f3fad35083837ef46a0bbce2fc57 nwlnkflt.sys
    Microsoft Corporation

    c99b3415198d1aab7227f2c88fd664b9 nwlnkfwd.sys
    Microsoft Corporation

    8b8b1be2dba4025da6786c645f77f123 nwlnkipx.sys
    Microsoft Corporation

    56d34a67c05e94e16377c60609741ff8 nwlnknb.sys
    Microsoft Corporation

    c0bb7d1615e1acbdc99757f6ceaf8cf0 nwlnkspx.sys
    Microsoft Corporation

    ca33832df41afb202ee7aeb05145922f ohci1394.sys
    Microsoft Corporation

    4bb30ddc53ebc76895e38694580cdfe9 oprghdlr.sys
    Microsoft Corporation

    c90018bafdc7098619a4a95b046b30f3 p3.sys
    Microsoft Corporation

    5575faf8f97ce5e713d108c2a58d7c7c parport.sys
    Microsoft Corporation

    beb3ba25197665d82ec7065b724171c6 partmgr.sys
    Microsoft Corporation

    70e98b3fd8e963a6a46a2e6247e0bea1 parvdm.sys
    Microsoft Corporation

    ccf5f451bb1a5a2a522a76e670000ff0 pciide.sys
    Microsoft Corporation

    52e60f29221d0d1ac16737e8dbf7c3e9 pciidex.sys
    Microsoft Corporation

    a219903ccf74233761d92bef471a07b1 pci.sys
    Microsoft Corporation

    9e89ef60e9ee05e3f2eef2da7397f1c1 pcmcia.sys
    Microsoft Corporation

    f50f7c27f131afe7beba13e14a3b9416 perc2hib.sys
    Microsoft Corporation

    6c14b9c19ba84f73d3a86dba11133101 perc2.sys
    Microsoft Corporation

    e82a496c3961efc6828b508c310ce98f portcls.sys
    Microsoft Corporation

    a32bebaf723557681bfc6bd93e98bd26 processr.sys
    Microsoft Corporation

    09298ec810b07e5d582cb3a3f9255424 psched.sys
    Microsoft Corporation

    80d317bd1c3dbc5d4fe7b1678c60cadd ptilink.sys
    Parallel Technologies

    86724469cd077901706854974cd13c3e pxhelp20.sys
    Sonic Solutions

    0a63fb54039eb5662433caba3b26dba7 ql1080.sys
    QLogic Corporation

    6503449e1d43a0ff0201ad5cb1b8c706 ql10wnt.sys
    Microsoft Corporation

    156ed0ef20c15114ca097a34a30d8a01 ql12160.sys
    QLogic Corporation

    70f016bebde6d29e864c1230a07cc5e6 ql1240.sys
    Microsoft Corporation

    907f0aeea6bc451011611e732bd31fcf ql1280.sys
    QLogic Corporation

    fe0d99d6f31e4fad8159f690d68ded9c rasacd.sys
    Microsoft Corporation

    11b4a627bc9614b885c4969bfa5ff8a6 rasl2tp.sys
    Microsoft Corporation

    5bc962f2654137c9909c3d4603587dee raspppoe.sys
    Microsoft Corporation

    efeec01b1d3cf84f16ddd24d9d9d8f99 raspptp.sys
    Microsoft Corporation

    fdbb1d60066fcfbb7452fd8f9829b242 raspti.sys
    Microsoft Corporation

    01524cd237223b18adbb48f70083f101 rawwan.sys
    Microsoft Corporation

    7ad224ad1a1437fe28d89cf22b17780a rdbss.sys
    Microsoft Corporation

    4912d5b403614ce99c28420f75353332 rdpcdd.sys
    Microsoft Corporation

    15cabd0f7c00c47c70124907916af3f1 rdpdr.sys
    Microsoft Corporation

    6728e45b66f93c08f11de2e316fc70dd rdpwd.sys
    Microsoft Corporation

    e9aaa0092d74a9d371659c4c38882e12 recagent.sys
    Smart Link

    f828dd7e1419b6653894a8f97a0094c5 redbook.sys
    Microsoft Corporation

    851c30df2807fcfa21e4c681a7d6440e rfcomm.sys
    Microsoft Corporation

    f17713d108aca124a139fde877eef68a RimUsb.sys
    tHQTTVS_VERSION_INFO?StringFileInfobVCompanyNameResearchInMotionLimitedZFileDescriptionBlackBerryDeviceDriverbFileVersion....aInternalNameRimUsbx*LegalCopyrightCopyrightResearchInMotionLimited(LegalTrademarks<nOriginalFilenameRimUsb.rcRProductNameBlackBerryDeviceDriverbProductVersion...DVarFileInfo$Translationt*

    a56fe08ec7473e8580a390bb1081cdd7 rio8drv.sys
    Diamond Multimedia Systems

    0a854df84c77a0be205bfeab2ae4f0ec riodrv.sys
    Diamond Multimedia Systems

    96f7a9a7bf0c9c0440a967440065d33c rmcast.sys
    Microsoft Corporation

    601844cbcf617ff8c868130ca5b2039d rndismp.sys
    Microsoft Corporation

    726548542afeca56257ff01eb13bb6d7 rndismpx.sys
    Microsoft Corporation

    d8b0b4ade32574b2d9c5cc34dc0dbbe7 rootmdm.sys
    Microsoft Corporation

    d507c1400284176573224903819ffda3 RTL8139.sys
    Realtek Semiconductor

    0dbcc071a268e0340a2ba6bdd98bace4 s3gnbm.sys
    SGraphics

    4019149e4e296072831c8855605d9fdc SBREDrv.sys
    m?nStringFileInfoeBCompanyNameSunbeltSoftwarePFileDescriptionAnti-RootkitEnginetFileVersion..tInternalNameSBRE.sys=LegalCopyrightCopyright-SunbeltSoftware.Allrightsreserved.LegalTrademarksSUNBELTSOFTWAREandthe"S"logoareregisteredtrademarksofSunbeltSoftware.CounterSpySDKisatrademarkofSunbeltSoftware.:tOriginalFilenameSBRE.sysvProductNameCounterSpytProductVersion..VProductBuildDate//::AMDVarFileInfo$TranslationtPADDINGXXPAD

    76c465f570e90c28942d52ccb2580a10 scsiport.sys
    Microsoft Corporation

    8d04819a3ce51b9eb47e5689b44d43c4 sdbus.sys
    Microsoft Corporation

    90a3935d05b494a5a39d37e71f09a677 secdrv.sys
    Macrovision Corporation

    0f29512ccd6bead730039fb4bd2c85ce serenum.sys
    Microsoft Corporation

    cca207a8896d4c6a0c9ce29a4ae411a7 serial.sys
    Microsoft Corporation

    0fa803c64df0914b41f807ea276bf2a6 sffdisk.sys
    Microsoft Corporation

    d66d22d76878bf3483a6be30183fb648 sffp_mmc.sys
    Microsoft Corporation

    c17c331e435ed8737525c86a7557b3ac sffp_sd.sys
    Microsoft Corporation

    8e6b8c671615d126fdc553d1e2de5562 sfloppy.sys
    Microsoft Corporation

    6b33d0ebd30db32e27d1d78fe946a754 sisagp.sys
    Silicon Integrated Systems

    d9673011648a71ed1e1f77b831bc85e6 slnt7554.sys
    Smart Link

    2c1779c0feb1f4a6033600305eba623a slntamr.sys
    Smart Link

    f9b8e30e82ee95cf3e1d3e495599b99c slnthal.sys
    Smart Link

    db56bb2c55723815cf549d7fc50cfceb slwdmsup.sys
    Smart Link

    895be38a993b9bd5abbe570d63d88a2e smbali.sys
    Microsoft Corporation

    017daecf0ed3aa731313433601ec40fa smclib.sys
    Microsoft Corporation

    489703624dac94ed943c2abda022a1cd sonydcam.sys
    Microsoft Corporation

    83c0f71f86d3bdaf915685f3d568b20e sparrow.sys
    Adaptec

    ab8b92451ecb048a4d1de7c3ffcb4a9f splitter.sys
    Microsoft Corporation

    76bb022c2fb6902fd5bdd4f78fc13a5d sr.sys
    Microsoft Corporation

    da852e3e0bf1cea75d756f9866241e57 srv.sys
    Microsoft Corporation

    3e5d89099ded9e86e5639f411693218f stream.sys
    Microsoft Corporation

    3941d127aef12e93addf6fe6ee027e0f swenum.sys
    Microsoft Corporation

    8ce882bcc6cf8a62f2b2323d95cb3d01 swmidi.sys
    Microsoft Corporation

    1ff3217614018630d0a6758630fc698c symc810.sys
    Symbios Logic

    070e001d95cf725186ef8b20335f933c symc8xx.sys
    LSI Logic

    80ac1c4abbe2df3b738bf15517a51f2c sym_hi.sys
    LSI Logic

    bf4fab949a382a8e105f46ebb4937058 sym_u3.sys
    LSI Logic

    369d0626687a968182a9db40fe8a0905 SynTP.sys
    Synaptics

    8b83f3ed0f1688b4958f77cd6d2bf290 sysaudio.sys
    Microsoft Corporation

    fd6093e3decd925f1cffc8a0dd539d72 tape.sys
    Microsoft Corporation

    4e53bbcc4be37d7a4bd6ef1098c89ff7 tcpip6.sys
    Microsoft Corporation

    9aefa14bd6b182d61e3119fa5f436d3d tcpip.sys
    Microsoft Corporation

    0539d5e53587f82d1b4fd74c5be205cf tdi.sys
    Microsoft Corporation

    6471a66807f5e104e4885f5b67349397 tdpipe.sys
    Microsoft Corporation

    c56b6d0402371cf3700eb322ef3aaf61 tdtcp.sys
    Microsoft Corporation

    88155247177638048422893737429d9e termdd.sys
    Microsoft Corporation

    699450901c5ccfd82357cbc531cedd23 tosdvd.sys
    Microsoft Corporation

    f2790f6af01321b172aa62f8e1e187d9 toside.sys
    Microsoft Corporation

    d74a8ec75305f1d3cfde7c7fc1bd62a9 tsbvcap.sys
    Toshiba Corp

    8f861eda21c05857eb8197300a92501c tunmp.sys
    Microsoft Corporation

    d85938f272d1bcf3db3a31fc0a048928 uagp35.sys
    Microsoft Corporation

    5787b80c2e3c5e2f56c2a233d91fa2c9 udfs.sys
    Microsoft Corporation

    1b698a51cd528d8da4ffaed66dfc51b9 ultra.sys
    Promise Technology
    Promise Technology
    Promise Technology
    Promise Technology
    Promise Technology

    402ddc88356b1bac0ee3dd1580c76a31 update.sys
    Microsoft Corporation

    bee793d4a059caea55d6ac20e19b3a8f usb8023.sys
    Microsoft Corporation

    b6cc50279d6cd28e090a5d33244adc9a usb8023x.sys
    Microsoft Corporation

    1df89c499bf45d878b87ebd4421d462d usbaapl.sys
    Apple

    ce97845d2e3f0d274b8bac1ed07c6149 usbcamd2.sys
    Microsoft Corporation

    1c1a47b40c23358245aa8d0443b6935e usbcamd.sys
    Microsoft Corporation

    173f317ce0db8e21322e71b7e60a27e8 usbccgp.sys
    Microsoft Corporation

    596eb39b50d6ebd9b734dc4ae0544693 usbd.sys
    Microsoft Corporation

    65dcf09d0e37d4c6b11b5b0b76d470a7 usbehci.sys
    Microsoft Corporation

    1ab3cdde553b6e064d2e754efe20285c usbhub.sys
    Microsoft Corporation

    290913dc4f1125e5a82de52579a44c43 usbintel.sys
    Microsoft Corporation

    791912e524cc2cc6f50b5f2b52d1eb71 usbport.sys
    Microsoft Corporation

    a717c8721046828520c9edf31288fc00 usbprint.sys
    Microsoft Corporation

    a0b8cf9deb1184fbdd20784a58fa75d4 usbscan.sys
    Microsoft Corporation

    a32426d9b14a089eaa1d922e0c5801a9 usbstor.sys
    Microsoft Corporation

    26496f9dee2d787fc3e61ad54821ffe6 usbuhci.sys
    Microsoft Corporation

    63bbfca7f390f4c49ed4b96bfb1633e0 usbvideo.sys
    Microsoft Corporation

    55e01061c74a8cefff58dc36114a8d3f vdmindvd.sys
    Ravisent Technologies

    0d3a8fafceacd8b7625cd549757a7df1 vga.sys
    Microsoft Corporation

    754292ce5848b3738281b4f3607eaef4 viaagp.sys
    Microsoft Corporation

    3b3efcda263b8ac14fdf9cbdd0791b2e viaide.sys
    Microsoft Corporation

    e28726b72c46821a28830e077d39a55b videoprt.sys
    Microsoft Corporation

    4c8fcb5cc53aab716d810740fe59d025 volsnap.sys
    Microsoft Corporation

    4e7b07653f4f9937cf62ad2869fba520 w39n51.sys
    Intel Corporation

    aced8c149b30f8496c237bcba3727b48 wacompen.sys
    Microsoft Corporation

    0308aef61941e4af478fa1a0f83812f5 wadv07nt.sys
    Intel Corporation

    714038a8aa5de08e12062202cd7eaeb5 wadv08nt.sys
    Intel Corporation

    7bb3aa595e4507a788de1cdc63f4c8c4 wadv09nt.sys
    Intel Corporation

    36e6c405b6143d09687f4056fd9a0d10 wadv11nt.sys
    Intel Corporation

    e20b95baedb550f32dd489265c1da1f6 wanarp.sys
    Microsoft Corporation

    352fa0e98bc461ce1ce5d41f64db558d watv06nt.sys
    Intel Corporation

    791cc45de6e50445be72e8ad6401ff45 watv10nt.sys
    Intel Corporation

    6768acf64b18196494413695f0c3a00f wdmaud.sys
    Microsoft Corporation

    6e1ec659e9ca82dd7d4afd982d11a731 wmiacpi.sys

    2f31b7f954bed437f2c75026c65caf7b wmilib.sys
    Microsoft Corporation

    cf4def1bf66f06964dc0d91844239104 wpdusb.sys
    Microsoft Corporation

    6abe6e225adb5a751622a9cc3bc19ce8 ws2ifsl.sys
    Microsoft Corporation

    f15feafffbb3644ccc80c5da584e6311 WudfPf.sys
    Microsoft Corporation

    28b524262bce6de1f7ef9f510ba3985b WudfRd.sys
    Microsoft Corporation


    #12 m0le

    m0le

      Can U Dig It?


    • Malware Response Team
    • 34,527 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:London, UK
    • Local time:03:08 PM

    Posted 11 September 2010 - 05:40 PM

    There's a suspicous driver which we are going to try and replace with a backup copy.
    • Boot the computer with the USB drive again.
    • Click on File
    • Expand mnt
    • Expand your USB (sdb1)
    • Confirm that you see driver.sh.
    • Press Tool at the top
    • Choose Open Terminal
    • Type bash driver.sh -f
    • Press Enter
    • You will be prompted to input a filename.
    • Type the following:
      wmiacpi
    • Press Enter
    • If succesful, the script will search this file.
    • After it has finished a report will be located in the USB drive as filefind.txt

    Please note - all text entries are case sensitive

    Copy and paste the filefind.txt for my review
    Posted Image
    m0le is a proud member of UNITE

    #13 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 06:29 PM

    results from filefind.txt (it doesn't look like it found it?)


    Search results for wmiacpi

    Edited by fawnlebowitz, 11 September 2010 - 06:32 PM.


    #14 m0le

    m0le

      Can U Dig It?


    • Malware Response Team
    • 34,527 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:London, UK
    • Local time:03:08 PM

    Posted 11 September 2010 - 07:16 PM

    It should have found at least one. I've redone the instructions as below:
    • Boot the computer with the USB drive again.
    • Click on File
    • Expand mnt
    • Expand your USB (sdb1)
    • Confirm that you see driver.sh.
    • Press Tool at the top
    • Choose Open Terminal
    • Type bash driver.sh -f
    • Press Enter
    • You will be prompted to input a filename.
    • Type the following:
      wmiacpi.*
    • Press Enter
    • If succesful, the script will search this file.
    • After it has finished a report will be located in the USB drive as filefind.txt

    Please note - all text entries are case sensitive

    Copy and paste the filefind.txt for my review
    Posted Image
    m0le is a proud member of UNITE

    #15 fawnlebowitz

    fawnlebowitz
    • Topic Starter

    • Members
    • 100 posts
    • OFFLINE
    •  
    • Gender:Male
    • Location:Central Virginia
    • Local time:10:08 AM

    Posted 11 September 2010 - 07:37 PM

    for some reason, it didn't write to the usb, but here is the text from the Find/Search:

    /mnt/sda1/WINDOWS/ServicePackFiles/i386/wmiacpi.sys
    /mnt/sda1/WINDOWS/system32/drivers/wmiacpi.sys
    /mnt/sda1/WINDOWS/$NtServicePackUninstall$/wmiacpi.sys




    0 user(s) are reading this topic

    0 members, 0 guests, 0 anonymous users